Thursday, June 7, 2018
Wednesday, June 6, 2018
Which type of malicious attack not only affects the bandwidth of your connection but also interferes with your mailbox's capability to handle normal email?
Which type of malicious attack not only affects the bandwidth of your connection but also interferes with your mailbox's capability to handle normal email?
- TCP Syn Scan
- Mail bombing
- Spam
- Flood pings
EXPLANATION
A mail bomb attack sends massive amounts of email to a specific person or system.
A huge amount of mail may simply fill up the recipient's disk space on the server or, in some cases, may be too much for a server to handle and cause the server to stop functioning.
Tuesday, June 5, 2018
If you have a RAID 10 setup with four 500 GB HDDs, how much usable storage capacity will you have?
If you have a RAID 10 setup with four 500 GB HDDs, how much usable storage capacity will you have?
In Windows Active Directory, what are Group Policy Objects?
In Windows Active Directory, what are Group Policy Objects?
- Settings that define what a system should look like and how it will behave
- They determine the hierarchy of a domain, which can fit the operational structure of an organization
- A set of folder rules that determine where Outlook will save email messages
- Affords the capability for secure extension of network operations to the Web
EXPLANATION
Group Policy, in part, controls what users can and cannot do on a computer system: for example, to enforce a password complexity policy that prevents users from choosing an overly simple password, to allow or prevent unidentified users from remote computers to connect to a network share, to block access to the Windows Task Manager or to restrict access to certain folders. A set of such configurations is called a Group Policy Object (GPO)See: http://searchwindowsserver.techtarget.com/definition/Group-Policy-Object
Friday, June 1, 2018
The Betamax was to VHS, as
The Betamax was to VHS, as
- DASD is to SAN
- Terminate and Stay Resident is to Internal OS Commands
- Switching is to Routing
- Token-Ring is to Ethernet
EXPLANATION
One one time in the 1980s Ethernet and Token-Ring were very competitive, vying for the same customers and networks, replacing Arcnet (similar to Token-Ring) an older network topology. Speed and reliability of Ethernet versus Token-Ring was the difference maker, and eventually Token-Ring is no longer used nor supported.SOURCE
http://www.eweek.com/networking/30-years-ago-networking-in-the-1980s-meant-ethernet-vs.-token-ringWednesday, May 30, 2018
Which of the following commands could you use to exit the vi Editor in Linux, saving changes?
Which of the following commands could you use to exit the vi Editor in Linux, saving changes?
- :q
- :q!
- :x
- Ctrl + Z
EXPLANATION
:x - Exit, saving changes
:q - Exit as long as there have been no changes
:q! - Exit and ignore any changes
Ctrl + Z - Suspend editor
https://www.cs.colostate.edu/helpdocs/vi.html
http://www.lagmonster.org/docs/vi.html
http://www.rollanet.org/~mdoc/vi.htm